Basics of Apple Device Security

Total Page:16

File Type:pdf, Size:1020Kb

Basics of Apple Device Security AN OVERVIEW FOR MAC, IPAD AND IPHONE Basics of Apple Device Security SMALL BUSINESS A well-planned cyberattack or an accidental download of 2 malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security. This guide is for anyone that has been tasked with Apple security concerns, like all IT security concerns, are real. managing Apple devices in your organization and wants to get serious about their organizational While Apple has invested a great deal in its security features security of their Apple devices, and offers basic and has rapidly become the leader in device and data privacy information for newcomers or a simple refresher for and security, no operating system is immune to security Apple management veterans. challenges. This means that administrators must not only respond quickly to security issues, but also proactively guard against them. 3 The basic building blocks Several factors work together to ensure the security of your organization’s hardware and data, and you can break them down into six main areas: Securing devices Apple native security Data encryption Keeping your physical devices Security systems already built-in The basics of encrypting data at Introduction secure and protecting those to macOS, iOS and iPadOS rest and data in transit using them to Apple Page 4 Page 7 Page 6 Security Compliance Secure monitoring Application security deployments and patching Monitoring devices to pinpoint Deploying with the highest level needed updates Keeping up-to-date software of security available Page 8 Page 9 Page 11 4 Building Block One: Apple Native Security How to make the most of them with device management Security features already built in to macOS (operating system for Mac) amd iOS (operating system for iPhone) and iPadOS (operating system for iPad) are extensive and come with several benefits: Apple operating systems are based on a UNIX foundation, a very well-researched and developed foundation with excellent stability Strong OS security framework Device security in the form of locking and device finders Ability to implement and configure security controls through configuration options via mobile device management (MDM) An MDM solution can take these existing security configurations and deploy (and enforce) them to a large group of devices. So, you can set up not only one Mac or iPad securely, but thousands. You also have more expansive security controls with an MDM tool that can lock and wipe devices that are lost or removed from the facility. 5 Security feature details Native security features for macOS, iOS and iPadOS macOS Security Features iOS Security Features iPadOS Security Features 1 Software System Integrity Gatekeeper Software Secure System App Store Software Secure System App Store Updates Protection (SIP) Updates Updates App Store FileVault XProtect Touch ID Hardware App Touch ID Hardware App Encryption Encryption Sandboxing Encryption Sandboxing App Sandboxing Privacy Settings Privacy Supervision Remote device Privacy Supervision finder for lost devices 6 Building Block Two: Securing Devices Tracking, securing and protecting devices and users Securing or restricting devices manually: One of the simplest ways to damage an organization’s security or to compromise end-user’s safety is through access to a single Mac iPad and iPhone device. Whether your organization serves healthcare workers, remote staff, retail floor employees or frequent travelers — at any Require passwords on all devices Require passwords on all devices given moment your devices could be in twenty different places. Enable Find My Mac through System Enable Find My Phone through System Lost or stolen devices Preferences > iCloud Preferences > iCloud Depend on individual user to be able to sign Depend on individual user to be able to A lost or stolen iPad, iPhone or Mac isn’t just a financial loss: into iCloud and remember password sign into iCloud and remember password it’s a huge security risk. The damage can be incalculable: a Track all Mac serial numbers Report to Apple online if a device has thief manages to find private student data from a lost laptop or Report to Apple online if a device has been been lost or stolen accesses the entire organization’s database from that laptop. A lost or stolen Enable parental controls on an individual former employee who still has her work laptop making private Enable parental controls on the device to device, creating different accounts for information public or offering it to competitors. Even a malware block websites (Only affects Safari browser) each device introduction from a remote source. Set and deploy all Restrictions and security Set and deploy all Restrictions and features from first use or setup with Blueprints security features from first use or setup Devices get lost and stolen. Accidents and moments of Lock or wipe any lost or misused with Blueprints inattention happen, and planning with the assumption that the device centrally Lock or wipe any lost or misused question is only when someone will lose track of a device is vital. Set up password requirements to deploy device centrally to all devices Set up password requirements to deploy In addition, many devices — especially those shared by multiple Manage and push OS Updates centrally to all devices users — require safeguards against misuse, accidental discovery Manage and push OS Updates centrally of another’s data, or viewing of inappropriate content. 7 Building Block Three: Encrypting Data Disc or device encryption. MacOS already has built-in disk encryption: FileVault. You don’t have to add any additional software in To manually enable FileVault: order to encrypt a drive on a Mac. 1. Navigate to System Preferences > Security and Privacy > FileVault FileVault is FIPS 140-2 certified. That means Apple’s 2. Select the toggle switch to turn on the option from there encryption system meets the highest standards for 3. Repeat federal government encryption. You can enable FileVault manually or remotely: user To enable FileVault across your organization’s devices, leverage an MDM solution to automate, deploy and enforce encryption. You can deploy a Blueprint that will enable can choose the option themselves on one device, FileVault, and IT can retrieve encryption keys in case staff need to de-encrypt the or IT can enable FileVault (using Jamf Now) across device down the road. hundreds or even thousands of devices in one session. 1. Create a Blueprint through a simple selection of options within Jamf Now and select “Enable FileVault” as a setting Jamf Now ensures that encryption keys are centrally Deploy to as many devices as you’d like stored in case you need to uncover data, someone 2. leaves or someone forgets their password. 3. There is no step three With Jamf Now, if a device is enrolled and has FileVault enabled through the MDM, recovery keys are stored centrally on the device details page in case IT needs to gain access. What about an Encrypting iOS and iPadOS devices is even easier. iOS and iPadOS devices have built-in encryption as soon as a passcode is set. You can do this individually, or you can do it from Jamf Now, as well as setting up parameters for the passcode such as iPad or iPhone? length and complexity. 8 Building Block Four: Compliance Monitoring Ensure that protocols and controls are in place on all devices A security system is only as good as its weakest point. For the best coverage, administrators must monitor the organization’s devices to ensure that every device is updated, has received the most recent patches, and has the correct encryption options enabled. Monitoring compliance with Jamf Now: To ensure that all of your organization’s devices are protected Monitoring compliance manually: through Jamf’s inventory feature: To ensure that all of your organization’s devices are protected, you would need to constantly audit devices. 1. View up-to-date, real-time information on all devices simultaneously Physically track down each device 1. 2. Deploy updates and security configurations for any 2. Go into each option individually to ensure that device that is not secured properly Software updates are all current 3. Say it with us: there is no step three Encryption is enabled No one has introduced malware or a virus 3. As updates are only as good as the last update you performed, repeat The ability to see device details helps you know which updates to 4. And repeat send where, and which security features to configure. Blueprints based on department, permissions, device type, or any other 5. This will require constant vigilance and a great deal of buy-in and categorization method mean that you can be as targeted or all- cooperation from end users encompassing in updates as they you choose. 9 Building Block Five: Application Security and Patching Keeping up-to-date on patches and ensuring the safety of applications Application Security: Apple has made apps as safe as possible to download and use with the following features: It’s vital to know that They’ve adopted a sandbox model: each app lives in its own space and can’t interact with other applications. your applications don’t To allow apps to read or write to others’ shared data requires approval from the user or administrator. contain malware or Apps in the App Store have been vetted to alleviate security risk. This is the only way to get apps on an other hostile code. If iPhone or iPad, which controls security. Confining Mac users to the App Store for their apps is a way that administrators can control security device-wide.
Recommended publications
  • Dropdmg 3.6.2 Manual
    DropDMG 3.6.2 Manual C-Command Software c-command.com February 16, 2021 Contents 1 Introduction 4 1.1 Feature List..............................................4 2 Installing and Updating 6 2.1 Requirements.............................................6 2.2 Installing DropDMG.........................................7 2.3 Updating From a Previous Version.................................7 2.4 Reinstalling a Fresh Copy......................................8 2.5 Uninstalling DropDMG.......................................9 2.6 Security & Privacy Access......................................9 3 Using DropDMG 13 3.1 Basics................................................. 13 3.2 Making a Bootable Device Image of a Hard Drive......................... 14 3.3 Backing Up Your Files to CD/DVD................................ 16 3.4 Burning Backups of CDs/DVDs................................... 17 3.5 Restoring Files and Disks...................................... 18 3.6 Making Images With Background Pictures............................. 19 3.7 Protecting Your Files With Encryption............................... 20 3.8 Transferring Files Securely...................................... 21 3.9 Sharing Licenses and Layouts.................................... 21 3.10 Splitting a File or Folder Into Pieces................................ 22 3.11 Creating a DropDMG Quick Action................................ 22 4 Menus 23 4.1 The DropDMG Menu........................................ 23 4.1.1 About DropDMG...................................... 23 4.1.2 Software
    [Show full text]
  • How to Disable Gatekeeper and Allow Apps from Anywhere in Macos Sierra
    How to Disable Gatekeeper and Allow Apps From Anywhere in macOS Sierra Gatekeeper, first introduced in OS X Mountain Lion, is a Mac security feature which prevents the user from launching potentially harmful applications. In macOS Sierra, however, Apple made some important changes to Gatekeeper that seemingly limit the choices of power users. But don’t worry, Gatekeeper can still be disabled in Sierra. Here’s how. Stand out at the party or promote your business with colorful powder coated and custom engraved Yeti tumblers from Perfect Etch. Traditionally, Gatekeeper offered three settings of increasing security: anywhere, App Store and identified developers, and App Store only. The first choice, as its name describes, allowed users to launch applications from any source, effectively disabling the Gatekeeper feature. The second choice allowed users to run apps from the Mac App Store as well as from software developers who have registered with Apple and securely sign their applications. Finally, the most secure setting limited users to running apps obtained from the Mac App Store only. While the secure options were good ideas for less experienced Mac users, power users found Gatekeeper to be too limiting and typically sought to disable it by setting it to “Anywhere.” In macOS Sierra, however, the “Anywhere” option is gone, leaving “App Store” and “App Store and identified developers” as the only two options. Disable Gatekeeper in macOS Sierra The Gatekeeper settings can be found in System Preferences > Security & Privacy > General. The Gatekeeper options are located beneath “All apps downloaded from:” with the choice of “Anywhere” missing. Thankfully, the “Anywhere” setting can be restored to Gatekeeper in Sierra with a Terminal command.
    [Show full text]
  • Sidecar Sidecar Lets You Expand Your Mac Workspace—And Your Creativity—With Ipad and Apple Pencil
    Sidecar Sidecar lets you expand your Mac workspace—and your creativity—with iPad and Apple Pencil. October 2019 Contents Overview ...............................................................................................................3 Easy setup ............................................................................................................4 iPad as second display ......................................................................................... 5 iPad as tablet input device ....................................................................................6 Additional features ...............................................................................................8 Sidecar | October 2019 2 Overview Key Features Adding a second display has been a popular way for Mac users to extend their desktop and spread out their work. With Sidecar, Extended desktop Mac users can now do the same thing with their iPad. iPad makes Expand your Mac workspace using your iPad as a second display. Place one app a gorgeous second display that is perfect in the office or on on each screen, or put your main canvas the go. Plus Sidecar enables using Apple Pencil for tablet input on one display and your tools and on Mac apps for the very first time. Convenient sidebar and palettes on the other. Touch Bar controls let users create without taking their hands off iPad. And they can interact using familiar Multi-Touch gestures Apple Pencil to pinch, swipe, and zoom; as well as new iPadOS text editing Use Apple Pencil for tablet input with your favorite creative professional gestures like copy, cut, paste, and more. Sidecar works equally Mac apps. well over a wired or wireless connection, so users can create while sitting at their desk or relaxing on the sofa. Sidebar The handy sidebar puts essential modifier keys like Command, Control, Shift, and Option right at your fingertips. Touch Bar Touch Bar provides app-specific controls at the bottom of the iPad screen, even if your Mac does not have Touch Bar.
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • Apple Music & Beyond
    EBOOK EXTRAS: v1.2 Downloads, Updates, Feedback TAKE CONTROL OF macOS MEDIA APPS Apple Music & Beyond Manage your audio and video content in the Music, Podcasts, TV, and Books apps for macOS by KIRK McELHEARN $14.99 Click here to buy the full 237-page “Take Control of macOS Media Apps” for only $14.99! Table of Contents Read Me First ............................................................... 5 Updates and More ............................................................. 5 What’s New in Version 1.2 .................................................. 6 A Note on Terminology ....................................................... 7 Introduction ................................................................ 9 Quick Start ................................................................ 11 A Brief Introduction to Apple’s Media Apps ................ 13 Play Music ................................................................. 15 Play Your Music ............................................................... 15 Control Music with the MiniPlayer ....................................... 22 View Lyrics for Your Songs ................................................ 25 Use the Full Screen Player ................................................ 27 Get Notifications as Your Music Changes ............................. 29 Search for Music .............................................................. 31 Let Genius Choose What to Play ........................................ 33 Use Playing Next to View and Manage a Music Queue ........... 38 Make
    [Show full text]
  • Apple at Work Deployment and Management White Paper
    Apple at Work Deployment and Management Simple to deploy. At any scale. Apple makes it easy for IT teams to administer devices, manage their configuration, distribute apps and content, and secure corporate data. With Apple Business Manager, devices can be distributed directly to employees and used right out of the box, all without manual configuration. And with flexible deployment models across all Apple platforms, IT can get employees up and running faster than ever with the best tools for the job. Management made easy Apple devices have a built-in mobile device management (MDM) framework, making it easy for IT to deploy devices, distribute apps and books, configure settings, and ensure the security of each device. Paired with a third-party MDM tool, IT teams can remotely manage and update devices over the air. And if devices ever go missing, IT teams can remotely and securely erase them. MDM supports configuration for apps, accounts, and data on each device. This includes integrated features such as password and policy enforcement. Controls remain transparent to employees while ensuring their personal information stays private. And IT maintains necessary oversight without disrupting the productivity employees need to succeed. Whether a business uses a cloud-based or on-premise server, MDM solutions are available from a wide range of vendors with a variety of features and pricing for ultimate flexibility. And each solution utilizes the Apple management framework in iOS, iPadOS, tvOS, and macOS to manage features and settings for each platform. Zero-touch deployment Apple Business Manager is a web-based portal for IT administrators to deploy iPhone, iPad, iPod touch, Apple TV, and Mac, all from one place.
    [Show full text]
  • What's New for Enterprise and Education-WWDC 2020
    What’s New for Enterprise and Education WWDC 2020 June 2020 (v1.0) Contents Introduction 3 Integration and Setup 4 Deployment and Provisioning 5 Configuration Management 6 Identity Management 13 Content Distribution 15 Security and Compliance 16 App Updates 21 AppleSeed for IT 23 Deprecated Services 24 Additional Resources 25 2 What’s New for Enterprise and Education June 2020 Introduction This document is for IT administrators who want to learn about the new security and deployment-related features across Apple platforms as of WWDC 2020. There are also updates to Apple School Manager, Apple Business Manager, and AppleSeed for IT, as well as changes to the Apple mobile device management (MDM) protocol and its associated payloads. This document supplements the Deployment Reference for iPhone and iPad, the Deployment Reference for Mac, and Mobile Device Management Settings for IT Administrators, all designed to help administrators understand the key technologies for deploying Apple devices at scale and providing an optimal experience for users. NOTE: This material is provided for information purposes only; Apple assumes no liability related to its use. The Apple software and services discussed hereunder are pre-release versions that may be incomplete and may contain inaccuracies or errors that could cause failures or loss of data. 3 What’s New for Enterprise and Education June 2020 Integration and Setup Apple School Manager and Apple Business Manager System for Cross-domain Identity Management (SCIM) Administrators can use SCIM to import users into Apple School Manager and Apple Business Manager. SCIM allows them to merge Apple School Manager and Apple Business Manager properties (such as SIS user name and grades in Apple School Manager, and roles in Apple School Manager and Apple Business Manager) over account data imported from Microsoft Azure Active Directory (Azure AD).
    [Show full text]
  • DRC INSIGHT System Requirements Table of Contents 2 UPDATE: What’S New, Ended, Ending and Coming 2 UPDATE: New Or Changing DRC Technology 4 Minimum Vs
    System Requirements Effective June 2021–October 2021 Current Update: June 25, 2021 Next Update: October 2021 This document is updated three times each calendar year. Table of Contents DRC INSIGHT System Requirements Table of Contents 2 UPDATE: What’s New, Ended, Ending and Coming 2 UPDATE: New or Changing DRC Technology 4 Minimum vs. Recommended 4 DRC INSIGHT Testing Device Requirements 5 DRC INSIGHT Testing Device Additional Notes 6 COS Service Device Requirements 8 DRC’s Device Support Policy 9 DRC’s Operating System Support Policy 10 DRC’s Operating System Version Support 11 Trademarks 13 UPDATE: What’s New, Ended, Ending and Coming The following is an overview of upcoming changes to the hardware and software supported for DRC INSIGHT and/or COS Service Devices. Operating System Support What’s New Windows 10 Spring Release (21H1) Microsoft released version 21H1 in spring of 2021. Support for this release will follow DRC’s Operating System Support Policy. Starting in July of 2021, DRC will only support the Microsoft supported versions of Windows 10. Support will be consistent with our Operating System Support Policy (see page 10). What’s Ended Windows 7 As a reminder, Microsoft ended support for Windows 7 in January of 2020. DRC no longer supports or allows Windows 7 for testing. Ubuntu 16.04 Support for Ubuntu 16.04 ended in April of 2021. DRC moved it to Best Effort Support in May of 2021 and will move it to End of Support in June of 2021. What’s Ending iPadOS 13 DRC anticipates Apple will discontinue support of iPadOS 13 in September with the introduction of iPadOS 15.
    [Show full text]
  • Apple Quicktime Player Audio Recording and Screencasts with Apple Quicktime Player for Macos #1 Launching
    Apple QuickTime Player Audio recording and screencasts with Apple QuickTime Player for macOS #1 Launching Launch QuickTime Player. The application is pre-installed on every Mac in the Applications folder. ©Screenshot, Apple #2 What kind of recording After launch, the application will ask if you want to open a pre-existing file. The relevant functions are found below the „File“ menu. ©Screenshot, Apple #3 Movie Recording If you want to record yourself and have no need to show content on your computer, choose the „New Movie Recording“ menu item. The small arrow next to the recording button lets you easily choose the integrated camera of your laptop or desktop computer. It is also possible to choose an external camera should you not want to use the internal camera. It is here that you also choose the microphone that you want to use. ©Screenshot, Apple Once you are finished with your recording you can press the red recording button again and the player will show you the resulting video. You can save and share the file twofold: You can use the „share“ icon in the player or you choose a location via the menu item „File > Save“. The video is now ready to be edited in another application or ready to be shared. ©Screenshot, Apple #4 Screen Recording Similar to the „Movie Recording“ option, QuickTime is able to record your entire screen or a selection of your screen with you able to talk over it. For that you navigate to „File > New Screen Recording“ and you will be presented with options in the translucent panel below.
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • Configurations, Troubleshooting, and Advanced Secure Browser Installation Guide for Macos and Ipados
    Configurations, Troubleshooting, and Advanced Secure Browser Installation Guide for macOS and iPadOS 2021–2022 Updated 9/2/2021 1 Table of Contents Configurations, Troubleshooting, and Secure Browser Installation for macOS and iPadOS ............. 3 How to Configure macOS Workstations for Online Testing .......................................................................... 3 Installing the Secure Profile for macOS ......................................................................................................... 4 Installing Secure Browser for macOS ............................................................................................................ 5 Installing the SecureTestBrowser App for iPadOS ........................................................................................ 5 Additional Instructions for Installing the Secure Browser for macOS ............................................................ 6 Cloning the Secure Browser Installation to Other macOS Machines ................................................... 6 Uninstalling the Secure Browser on macOS ......................................................................................... 6 Additional Configurations for macOS ............................................................................................................ 6 Disabling Updates to Third-Party Apps ................................................................................................. 7 Disabling Fast User Switching .............................................................................................................
    [Show full text]
  • Tips to Keep Connected Using Facetime, Zoom and Skype Contents
    Tips to keep connected Using FaceTime, Zoom and Skype Contents FaceTime on iPad or iPhone ................................................................ 2 FaceTime on macOS ........................................................................... 3 FaceTime on Andorid or Windows ....................................................... 3 Zoom on macOS, iPad or iPhone ........................................................ 4 Zoom on Android ............................................................................... 5 Zoom on Windows ............................................................................. 6 Skype on Windows ............................................................................. 7 Skype on macOS ................................................................................ 8 Skype on Android ............................................................................... 9 Skype on iPad and iPhone ................................................................ 10 2 FaceTime on iPad or iPhone In the FaceTime app , you can make video or audio calls to friends and family, whether they are using an iPhone, iPad, iPod touch, or a Mac. With the front camera, you can talk face-to-face; switch to the rear camera to share what you see around you. 1. Go to Settings > FaceTime, then turn on FaceTime. 2. If you want to be able to take Live Photos during FaceTime calls, turn on FaceTime Live Photos. 3. Enter your phone number, Apple ID, or email address to use with FaceTime. To make a FaceTime call 1. In the FaceTime app , click the + in the top right hand of your screen. 2. Type in the person’s name (from your address book on your phone/ iPad) 3. Click ‘audio’ or ‘video’ to start the call. Apple, iPad, iPhone, macOS, FaceTime: Copyright © 2020 Apple Inc. All rights reserved. 3 FaceTime on macOS In the FaceTime app , you can make video or audio calls to friends and family, whether they are using an iPhone, iPad, iPod touch, or a Mac. With the front camera, you can talk face-to-face; switch to the rear camera to share what you see around you.
    [Show full text]